Sciweavers

516 search results - page 70 / 104
» Comparing Two Information Flow Security Properties
Sort
View
ICPR
2006
IEEE
14 years 10 months ago
Vehicle Lateral Position Estimation Method Based on Matching of Top-View Images
In this paper, a method to estimate the lateral position of the vehicle from a sequence of moving camera images is proposed. Proposed method relies on the plane projective transfo...
Tomoaki Teshima, Hideo Saito, Shinji Ozawa, Keiich...
CN
2004
108views more  CN 2004»
13 years 8 months ago
Routing bandwidth-guaranteed paths with restoration in label-switched networks
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing ...
Samphel Norden, Milind M. Buddhikot, Marcel Waldvo...
CSFW
2006
IEEE
14 years 3 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICCBR
2009
Springer
13 years 6 months ago
On Similarity Measures Based on a Refinement Lattice
Abstract. Retrieval of structured cases using similarity has been studied in CBR but there has been less activity on defining similarity on description logics (DL). In this paper w...
Santiago Ontañón, Enric Plaza
IMC
2004
ACM
14 years 2 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...